From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 21974 invoked by alias); 1 Dec 2015 12:24:21 -0000 Mailing-List: contact zsh-workers-help@zsh.org; run by ezmlm Precedence: bulk X-No-Archive: yes List-Id: Zsh Workers List List-Post: List-Help: X-Seq: 37267 Received: (qmail 9152 invoked from network); 1 Dec 2015 12:24:19 -0000 X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on f.primenet.com.au X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,T_HDRS_LCASE, T_MANY_HDRS_LCASE autolearn=ham autolearn_force=no version=3.4.0 X-AuditID: cbfec7f5-f79b16d000005389-b8-565d916fe0d2 Date: Tue, 01 Dec 2015 12:24:12 +0000 From: Peter Stephenson To: Zsh Hackers' List Subject: zsh-workers/37266 has a malicious attachment Message-id: <20151201122412.7d355172@pwslap01u.europe.root.pri> Organization: Samsung Cambridge Solution Centre X-Mailer: Claws Mail 3.7.9 (GTK+ 2.22.0; i386-redhat-linux-gnu) MIME-version: 1.0 Content-type: text/plain; charset=US-ASCII Content-transfer-encoding: 7bit X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrOLMWRmVeSWpSXmKPExsVy+t/xq7r5E2PDDNY9V7Q42PyQyYHRY9XB D0wBjFFcNimpOZllqUX6dglcGX3LNjAX7Ges6Dt3ir2BcRZjFyMnh4SAicTPFXOZIGwxiQv3 1rN1MXJxCAksZZQ4s/0yE4Qzg0nizbW5rBDOaUaJ3z2z2CGcM4wSTQ/vsIH0swioSix9vxVs FpuAocTUTbOBdnBwiAhoS7R/FAMxhQVMJc4+9QKp4BWwl3g2tZUdxOYX0Je4+vcT1BX2EjOv nGGEqBGU+DH5HguIzSygJbF5WxMrhC0vsXnNW2YQW0hAXeLG3d3sExgFZyFpmYWkZRaSlgWM zKsYRVNLkwuKk9JzjfSKE3OLS/PS9ZLzczcxQoLz6w7GpcesDjEKcDAq8fBKrI0JE2JNLCuu zD3EKMHBrCTCK10dGybEm5JYWZValB9fVJqTWnyIUZqDRUmcd+au9yFCAumJJanZqakFqUUw WSYOTqkGRj3ts/eiZ8Rvt4y6+/y/0R+pnAnq13yXhh53Y3c6Nre2+a/u3hUrs67pTV3r53Zk VuNcf76e2AhmPyG2izcOMGde69+/0rd4ac/JixukNi+OdkrcLeCsWrCcMU/3o3LsynjWlCyP RvucS/OX3pLvczFg0b764m3Etk9HpysrKG7f7b3imuidaCWW4oxEQy3mouJEAFRwOBNKAgAA ...probably obvious enough to everyone here, but as it got flagged up by our email system I thought it was worth reporting more widely. Subject line is "Your e-ticket #0000228935". pws